By Angela Bitter Comm 165 A.K.A. “Internet Etiquette”

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

Gold Country Computer Learning Center Netiquette Manners for a Hi Tech World Don Tweedie.
Business Etiquette Are you being Rude? by Paula N. Strozier.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
Information and Communication Technology
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Netiquette Guidelines
ETIQUETTE WHAT YOU SHOULD KNOW BEFORE YOU CLICK SEND.
Bullying Bullies are those people who gain gratification (a sense of happiness) when they have provoked or tormented others. They feel better by making.
Etiquette This is my slideshow about tools and etiquette that help you to communicate with others in a business context. By Jake Alaia.
Studying with Technology Session 5b By Ian Cole Lecturer in Information & Communication Technology.
Etiquette A Guide to Internet Communication.
Studying with Technology Introduction to module By Ian Cole Lecturer in Information & Communication Technology.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Being Safe on the Internet By: Hope Blackwell. What we will talk about today: Internet Safety Netiquette Rules for the internet Copy Right Laws.
Business Etiquette. “There are four ways, and only four ways, in which we have contact with the world. We are evaluated and classified by these.
COMMUNICATION IGCSE ICT 0417 Section 9.
This PowerPoint presentation will show you how to use your productively and successfully.
 To: means to the person you are sending the to.  CC: Carbon copy, to add additional addresses.  BBC: Blind carbon copy, to add additional addresses.
Digital citizenship BY MRS. DERITA. Digital Communication The digital exchange of information.
Evidence. Sending with attachment with zip folder.
ETIQUETTE AND EVIDENCE
Frank Hagy, CIO 09 November © Florida League of Cities, Inc All rights reserved Professional Image The Organization’s Personal Legal Risks.
How to use safely and efficiently
Information guide.
Communicating Information: and Attachments.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Why we use . ETIQUETTE COMMUNICATING MANAGING .
NETIQUETTE. WHAT IS IT??? Netiquette refers to the rules of online etiquette that guide users while working, communicating, and utilizing resources in.
Pete Mendicino Mendicino.net (443) Slide number 1.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
evidence By Sam Phillips. evidence Sending and replying.
Tools  Subject- a title to your to give an idea what the will be about before the receiver opens it.  Attachment- a file or document.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
This PowerPoint presentation will show you how to use your productively and successfully.
Evidence Including tools and etiquette.
What Does Your Netiquette Say About You? WLN-August 26, 2008.
By: Elizabeth Scruggs Digital Citizenship Project.
Preparing s Using Etiquette Lesson A4-3.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
Etiquette. Sending s 1. Make sure your includes a courteous greeting and closing. Helps to make your not seem demanding or terse.
Preparing s Using Etiquette. Learning Objectives Define . List the parts of an and an header. List rules for etiquette.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
Library Technology Hub
Everything you need to know about technology at PHS Denise Kornegay, Librarian Dee Martin, Computer Lab.
Lesson 2 . Objectives Describe Understand how to send, reply, and forward Define and send attachments.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
ETIQUETTES “ - when it absolutely positively has to get lost at the speed of light.”
Netiquette (Internet Etiquette)
Internet Safety, Netiquette, Copyright Law, and Ethics
EFFECTIVE COMMUNICATION PRESENTED BY THE SOLUTIONS GROUP.
Take a Second Look Before You Send a Message. Do Not Default to "Reply All”
Learning to effectively communicate electronically.
Writing Messages. User Name  Good vs. Bad  How do you want to be viewed  Informed (educated) vs Uninformed (uneducated)  What ideas are.
Christian Citizenship in a Digital World Lesson 3: Digital Communication.
1 Tech Tuesday: Setting up Emai content/uploads/2015/06/PRC- TechTuesday-SettingUp .pptxhttp://pbdd.org/wp- content/uploads/2015/06/PRC-
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 24 December 2011Working On-Line (BG)1.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 27 March 2012Working On-Line (BG)1.
3.2 Introduction to .
Netiquette Test Your Knowledge… Netiquette is short for:
Computer Literacy.
Huntington Beach Public Library
3.2 Introduction to .
CBP Program – Business Etiquette
Lesson 2 .
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Netiquette Guidelines
Presentation transcript:

By Angela Bitter Comm 165 A.K.A. “Internet Etiquette”

WHAT IN THE WORLD IS NETIQUETTE?  NETIQUETTE DEFINITION: Using technology effectively to communicate with others both personally and professionally with knowledge, understanding and courtesy. NETIQUETTE DEFINITION NETIQUETTE DEFINITION Judith Martin (Miss Manners)

DO NOT TYPE IN ALL CAPS Did you know?  Typing in all caps is considered YELLING or SCREAMING on-line!!  Those who type in all caps are perceived as lazy and inconsiderate of those who will be reading their e.mail.  Reading text IN ALL CAPS IS MORE DIFFICULT AND TAKES LONGER.

DON’T USE COLORED TEXT OR BACKGROUNDS  Colored text and format choices make e.mails difficult to read.  Creative formatting may force the reader to convert the text before they can reply.  Large graphics may be too time-consuming to download…therefore, you may end up in the trash can.

USE BLIND CARBON COPY  Don’t be considered a Newbie or Novice…when sending e.mail to large groups of people, use BCC to eliminate long address lists.  Sending others’ e.mail addresses is a violation of privacy!  Never give out phone numbers or personal information.

THE “FORWARD” PLEDGE  “I will not forward any dumb joke, “chain letter” or unimportant e.mail to my friends without permission.”  “I understand that by doing so I may fill up their inbox, use other’s resources unnecessarily, and may cause other important e.mail to bounce.”  “I understand that most folks have seen these e.mails a million times and find them annoying.”  “I know that by forwarding these so- called humorous e.mails, I may offend or tick-off people who do not share my sense of humor.” Please raise your right hand and repeat after me…

USE RETURN RECEIPT REQUEST SPARINGLY  RR’s should be reserved for critical issues, such as legal or business.  Keep in mind that “opened” e.mail doesn’t necessarily mean “read” e.mail.

DO NOT RESPOND TO OFFENSIVE S  Like mother told us…  If you do not have anything nice to say…don’t say anything at all!

DO NOT FORWARD VIRUS WARNINGS  Forwarded warnings from friends are usually hoaxes.  If in doubt, check the Symantec’s Virus Hoax Page.  Always delete, especially if you’re told to forward it to everyone you know.  Depend only on your own virus software to give you the scoop.

DO NOT POST OR FORWARD PRIVATE S  Always remember that all private e.mails are copyrighted by the original author.  Always ask permission first!!!!

ALWAYS MINIMIZE, COMPRESS OR “ZIP” LARGE FILES  Some files are so large that other e.mail will bounce!  Compress anything over 200,000 bytes (files can be viewed in Internet Explorer by right clicking on the file name and choosing Properties.  Don’t send unannounced large attachments to others because you think a photo is cute or cool.  Only send business files during business hours.

LAST BUT NOT LEAST… REMEMBER THE LEARNING CURVE  The only consistency in technology is change!  Keep an open mind and be teachable about computer culture.